Tracing State-Aligned Activity Targeting Journalists, Media

Continue reading


@proofpoint.com | 1 year ago

Microsoft/GitHub OAuth Implementation Vulnerabilities to Redirection Attacks

Continue reading


@proofpoint.com | 2 years ago

Operation SpoofedScholars: A Conversation with TA453

Key Takeaways TA453, an Iranian-state aligned actor, masqueraded as British scholars to covertly target individuals of intelligence interest to the Iranian government in what Proofpoint has dubbed Operation SpoofedScholars.   | Continue reading


@proofpoint.com | 2 years ago

New Variant of Buer Malware Loader Written in Rust

Proofpoint researchers identified a new variant of the Buer malware loader distributed via emails masquerading as shipping notices in early April. | Continue reading


@proofpoint.com | 3 years ago

Attackers Use Compromised Accounts to Create and Distribute Malicious OAuth Apps

In 2020, Proofpoint detected more than 180 different malicious applications, attacking over 55% of customers with a success rate of 22%. | Continue reading


@proofpoint.com | 3 years ago

A Comprehensive Look at Emotet’s Summer 2020 Return

*//*-->*//*-->*/TA542, an actor that distributes Emotet malware, took an extensive break from delivering malicious emails in 2020. They were absent from the landscape for over five months, last seen on February 7 before returning on July 17, 2020. While Emotet usually takes break … | Continue reading


@proofpoint.com | 3 years ago

Threat Actors Repurpose Hupigon in Adult Dating Attacks Targeting US Univs

Hupigon is a remote access Trojan (RAT) that has been around since at least 2006. Hupigon has been anecdotally associated with state-sponsored APT threat actors among others. Proofpoint researchers have recently discovered a large volume Hupigon campaign primarily targeting both … | Continue reading


@proofpoint.com | 4 years ago

Malware Targets U.S. Utilities, Phishing Impersonating Engineer Licensing Boards

Continue reading


@proofpoint.com | 4 years ago

Phishing template uses fake fonts to decode content and evade detection

Continue reading


@proofpoint.com | 5 years ago